Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
msmart007 | 01 Oct 2014 | 0 comments

A question that comes up increasingly in our constantly changing world of security is: “How does data centre security differ from network and end-point security?”

There are a number of fundamental differences and it’s worth taking a look at some of these. For example, when it comes to the data centre, there are more constrains on security, in terms of performance – i.e., not standing in the way of innovation. In fact, performance becomes a real issue, because of the speed of change and innovation, but also in terms of the performance of the systems and applications that are running; especially as security can slow down applications and reduce capacity.

Another point to bear in mind is that the attack surface is about much more than simply the host. People don't necessarily think about applications running within the host, network devices (such as storage) and the user. That's where we will see real change in people operating the data centre, with customers often...

shankar_somasundaram | 30 Sep 2014 | 0 comments

Symantec is investing in the Internet of Things (IoT) – with different verticals like automotive, healthcare, industrial control systems, retail, being key areas of focus. And the reason isn’t hard to understand: IoT – connecting machines and devices together into functioning, intelligent systems – is a big, growing and diverse landscape that has permeated the industry at an astonishing rate and opened up vast opportunities, enabling unparalleled levels of automation and supply chain efficiencies.

Take industrial control systems (ICS), for example: they are now being connected to the Internet on a massive scale, with IoT bringing even greater acceleration of connectivity, not only in the production process and supply chain, but also right across all business processes. Organizations are increasingly embracing these innovations and moving towards improved interconnectivity, in the drive to be more globally competitive and gain a greater foothold in their market sectors.

...
Ilias Chantzos | 19 Aug 2014 | 0 comments

Cyber security as a political issue? Undoubtedly. What makes it so is that governments and politicians at large recognise national interest is heavily impacted by the influence of cyber – now generally used to refer to all automated or computerised systems, in terms of both hardware and software – because cyber is the horizontal element that underpins economic life.

With globalisation enabled by transport technology, communications technology and global markets, and cyber used so widely within the economy and our personal lives, its reach extends deep into the political landscape. Cyber runs our economy, it can be used to reach large amounts of the population, for committing crime, be weaponised and it affects national security – and therefore the state – at its core. All of which means that it has a direct impact on public interest and therefore attracts political attention.

UK...

Arnaud_Taddei | 18 Aug 2014 | 1 comment

In data centres across the world the principles of server virtualisation, and their impact on how server resources can be allocated, managed and secured, have been established over the past decade and are now part of mainstream IT. 

While similar ideas have taken some time to infiltrate into the logical and physical architectures of our communications networks, they are now reaching the mainstream - in the shape of Network Function Virtualisation (NFV) and Software Defined Networking (SDN). 

The former (NFV) enables an opening up of networking functionality, while the latter (SDN) speaks to the ability to orchestrate and control networking functions as a result. Together, they separate the control plane from the networking layer, enabling networks to be created more flexibly than was possible in the hardware-defined days of ‘big iron’. 

In addition, they present the opportunity to create closer, more...

Caroline Dennington | 28 Jul 2014 | 0 comments

Symantec is in transition and so, too, are the problems that customers are asking us to solve. We believe that the time to simplify and integrate one of the industry’s broadest portfolios is now, refocusing on what’s needed most, in order to fulfil those customers’ widely diverse and ever-expanding expectations.

That is a role we are more than happy to take on at Symantec, especially as more and more organisations are telling us that what they want, most of all, is a trusted IT advisor that can help them seize new opportunities, reduce risk and cost, and ensure that services and data are available, resilient and compliant. In other words, they want a simpler way to grow their business – and a partner to keep their systems and people safe on that journey.

Go_CMYK_0_0.jpgSymantec has been making important changes over the last 18 months  that will help us better serve our customer’s...

Caroline Dennington | 22 Jul 2014 | 0 comments

The recent visit of several industry analysts in Symantec's UK office created the perfect opportunity to provide insights into Symantec's Unified Information Management Strategy and the Information Fabric Platform that underpins this strategy.

Paul Dominjon, Symantec's Senior Product Marketing Manager, pointed out that customers are moving increasingly to a virtual environment, while many business-critical applications remain on physical servers. At the same time, our customers often have operations that have grown through mergers and acquisitions with up to two to three backup solutions in play and little or no integration. “The upshot of this is that customers are simply too busy to rationalize, consolidate and simplify their technology and licenses,” said Dominjon.

Whatever the customer infrastructure, Symantec's role is to support our customers and the wider business community through our redefined Unified Information Management Strategy, delivering a platform...

Drew Meyer | 17 Jul 2014 | 0 comments

Symantec’s unified vision and new array of solutions around its Information Management (IM) offering are propelling customers towards ever greater agility, freedom of choice and the highest levels of security in what is becoming an increasingly complex and disparate IT environment for organizations everywhere.

That was the good news we were able to deliver at a recent webinar for the APJ region where industry analysts gathered to hear how environments spanning both physical and virtual can be better managed using our IM solutions. What we were able to tell everyone was exactly how we are now able to reduce those complexity issues they face every day, supporting our customers as they perform crucial functions around archiving, data protection and backup, and data recovery.

In a world where the move into the cloud is accelerating – public, private and hybrid –customers want to leverage all the advantages this may offer by having the flexibility of running any operating...

Sian John | 15 Jul 2014 | 0 comments

An ongoing debate is about the location of antivirus - whether it should happen within a virtual machine or outside of it, in the management/hypervisor layer.
 
This question becomes increasingly important when considering software-defined networking (SDN) or more specifically, what happens as the creation of virtual machines becomes increasingly automated?
 
As use of SDN increases, so it becomes more important to ensure all security features are enabled - such as intrusion protection, firewall and behavioural monitoring - not just antivirus.
 
This is primarily because it may not always be obvious how and where a VM is to be used, and therefore how well protected it needs to be. However it is not so straightforward to run some features 'off-VM' - for example behavioural monitoring requires direct access to system resources.
 
Equally there are times when it makes more sense to run...

fbunn | 17 Jun 2014 | 0 comments

While Communications Service Providers (CSPs) tell their customers they are more than ‘simply' network utilities, it stands to reason that they need to provide similar levels of service to traditional utility companies such as water or energy providers. 

In security terms this means offering a certain level of information protection - as has been said more than once, just as we expect water to come out of our pipes clean, so we expect the same for our information. 

This doesn’t mean that the onus is entirely on the CSP, of course. Across the history of end-point security, providers and software vendors have had to work together to help protect the confidentiality, integrity and availability of data whether it is at rest on a PC, or in transit across the network. 

More recently, the rise of mobile computing has seen handsets start simple and become increasingly complex, meaning that consumers are not always well prepared against...

fbunn | 21 May 2014 | 0 comments

An interesting finding from the Internet Security Threat Report we issued last month concerns companies with 1-2,500 employees - variously grouped as the Small to Medium Business (SMB) sector - who are seeing the largest increase in targeted attacks. These attacks have already increased by 91% year on year; in addition, whereas 50% were aimed at SMBs in 2012, by 2013 the number had increased to 61%.

The clear suggestion - confirmed by other research we have done - is that the creators of such attacks are becoming smarter in terms of understanding how to profit from targeted attacks. As a result they are focusing less on bigger enterprises and more on smaller and mid-size companies, which often have less security countermeasures in place. 

This begs the question - where are such organisations going to get help, and...